The Security X Factor Transcript. Part 1: The Study

Size: px
Start display at page:

Download "The Security X Factor Transcript. Part 1: The Study"

Transcription

1 The Security X Factor Transcript Part 1: The Study Stephanie Losi: Welcome to the CERT Podcast Series, Security for Business Leaders. The CERT program is part of the Software Engineering Institute, a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania. You can find out more about us at cert.org. Show notes for today s conversation are available at the podcast website. My name is Stephanie Losi. I am a journalist and graduate student at Carnegie Mellon, working with the CERT Program. I am pleased to introduce Gene Kim, Chief Technology Officer of Tripwire and co-founder of the IT Process Institute. Today we'll be discussing the critical role of change management in security and the study that confirms this. So, Gene, welcome. Gene Kim: Happy to be here. Stephanie Losi: Thank you. What I would like to ask you is, change management has played a large role in your career, ranging from the development of Tripwire to your recent work on prioritizing IT controls. So what initially led you to identify change management as a vital focal point for security? Gene Kim: I think there were a couple pivotal moments where we kept on gravitating towards this area. One was since 1999 we have been studying a group of high-performing IT operations and security organizations that had the best service levels as measured by mean time to repair, mean time between failures; best security as measured by earliest and most consistent integration of security into the IT operations life cycle; the best posture of compliance as measured by fewest number of repeat audit findings and the fewest amount of staff dedicated towards those compliance activities; and then the fourth characteristic was that they were also most efficient, as measured by high server-to-system-administrator ratios and low amounts of unplanned work. So we co-founded the IT Process Institute really to try to capture and codify what is it that these 11 high-performing organizations were doing differently. And so that led to a project that we called the Visible Ops work, where that really codified the transformations of how those organizations became great, and specifically compared it to all the transformations we had seen fail the hundreds, if not thousands, of organizations that have tried to transform but never reached the end result. So we published that in And after that we stepped back and asked the question, "Is Visible Ops correct?" Right? That one of the two things that we posited was that what made these high performers different was they all had a culture of change management and a culture of causality. So we had this great desire to bring a little bit more empirical rigor to IT management and IT security management. Stephanie Losi: Right. And so these 11 organizations, how did you select them? How big was the pool to start with, and how did you identify these particular organizations? Gene Kim: Yeah. It took many years to kind of come up with the crisp criteria, but they were all talking differently, acting differently, and had these radically phenomenally better results. So we actually came up with quantitative measures of these things. And what was amazing was they came from all different industries, all different company sizes. Essentially they had all independently, Darwinistically, came up with the same operational run book, essentially each to

2 prevent the last disaster from happening again. So one of my favorite quotes is, "Behind every FAA regulation is an airline crash." Stephanie Losi: So what kinds of incidents were you seeing that spurred them to really make these changes? Gene Kim: Yeah. That is a great question. They were all high-profile outages, catastrophic incidents of unplanned work, late projects, as well as security incidents. And so our goal was to really say, "All right, is it true that a culture of change management and a culture of causality is what really discriminates high performers from low performers?" So in 2004, we started a project called the IT Performance Control Study, which is really designed to say, "Hey, there are many good things that you can do, ITIL process frameworks, COBIT control frameworks. But what they all sort of don't cover is, where do you start? These are all sort of like dictionaries. Organizations don't do dictionaries. They do projects, right? So our goal was to say, "All right, let s see if we can test all of them, just like a pharmaceutical would do with a drug trial." So we took the six leading areas in ITIL that people said "here is where you should start": access management, change management, configuration management, release management, service level management, and resolution processes. And so we decided to test all of them. We picked 25 control measures spanning from ops measures to security measures. And we benchmarked 98 organizations over the last three years, and the goal was really to come up with better answers to, "What are the rewards of high performers in terms of performance measurements? What controls do high performers do that medium and low performers don't?" And I think there were two huge surprises that came out of this that was incredibly illuminating. The first surprise was how good the high performers were. We expected a performance difference of 2X. What we found instead was that high performers consistently outperformed their peers by a factor of 5 to 8X. Stephanie Losi: That's a lot. Okay. Gene Kim: Oh, that is amazing. Stephanie Losi: So what was causing that to happen? Gene Kim: What was different in the performance was that they were doing 8 times as many projects. They were managing 6 times as many applications. They were implementing 7 to 14 times as many changes. When they were making the changes they had one-half the change failure rate, one-quarter of the first fix failure rate, five times higher server/sys admin ratios, and, incidentally, higher budgets three times higher budgets. There are two explanations, right? One is high performers are high performers because they have more money, but I think the more persuasive argument is IT has two jobs: deliver new projects to the business; operate and maintain what you have. And what we find is that low performers can't do either, and so therefore they can't get budgets to do anything. Incidentally, the security difference between high performers and medium and low performers is almost the same: 5 to 8X. What percentage of security incidents result in a loss event? High performers it was like one-fifth. What percentage of security incidents result in a loss? About one-fifth. And again, three times higher budgets between high performers and low performers. The second big surprise is, what are the high performers doing differently? We found out of the six ITIL processaries, the 63 controls that fit them, there were two controls that every high performer had that none of the medium and low performers had. So, in other words, they were universally

3 present in high, universally absent in medium and low. And those two things were: Do you monitor systems for unauthorized change, but just as important is, do you have defined consequences for intentional and unauthorized change? Stephanie Losi: Interesting. Okay. And so the first one fits right back to Tripwire, so obviously that was of great interest to you. So when you looked at these conclusions, what did you think about them, and did you communicate these findings to the organizations? Gene Kim: Oh, absolutely. They say the goal of science is to explain the most amount of observable phenomena with the fewest number of principles, confirm deeply held beliefs, and reveal surprising insights. And I think that the two discriminate controls monitoring systems for unauthorized change and defining consequences really, when you hold that up against the light with Visible Ops, I see a culture of change management that says tone from the top. Whoever is at the top of the organization says, "Change management is so important to us that the only acceptable number of unauthorized changes is zero. And we're not going to manage by belief. We have to manage by fact, and we're going to hold people accountable to that, and we're going to put controls in place so that we can find variance before causes or production outage, or security incidents." I think it definitely validated some beliefs that we have strongly held. But I think more importantly it simplified what is important, and I think helps the management focus on what is keeping them from being high performers. Part 2: Taking Action Stephanie Losi: What would you say to a company that really doesn't have a change management process in place right now? How do they get there? And then how do you enforce that down in the trenches as well, because it's one thing to say, "Well, there will be no unauthorized changes," and another to really enforce that when someone is under pressure and they have a deadline coming up, and they need to get it done. Gene Kim: Exactly. Oh, in fact, how many times have I heard that? Absolutely. "Our business is so dynamic that we cannot suddenly we have to break the rules." Right? So the way that we need to coach the CIO to sort of keep the organization on the wagon is essentially by having them publish three things. One is a list of all scheduled authorized changes. The second was a list of all unauthorized changes. The third one is, what are the consequences and the ramifications to that person who made those unauthorized changes? And so working with the audit community, if you can imagine, this is going to be the plan that they would put IT management on, and the goal here is to say, "All right, the declaration is good. Now prove to me on an ongoing basis that you are actually following these procedures." And I think what is just so neat about auditors is kind of the third step, which is: Trust is not a control. Hope is not a strategy. So what we are going to do is we are going to look for all unplanned outages. Really, the theory there is that behind every outage unplanned outage is a failure in the change control process. So where would we look if we want to find evidence that the change control process really isn't working? Just look for the outages, and that is very hard to hide. Stephanie Losi: And I have a question for you about why you think change management turned out to be such a strong determinant of overall security performance? We've seen that it is so important to get it in there to become a high performer, and that you have to really kind of tackle it from the top and get the tone from the top all set, and then make sure it's enforced in the trenches. So if an organization is going to go through this, is going to tackle what could be a significant project to really change the culture of the organization as regards this, I think they should understand why do you think this turned out to be such a strong determinant.

4 Gene Kim: What a great question. In fact, this is still something we are still really trying to gain an understanding of, but I think if you look back far enough in the security theory, the people in the old electronic data processing age, they would say there are three places where security must hang their hat. One is access controls. Do only appropriate people have access to computing infrastructure? The second one was change. Are all changes being controlled in a way that makes sure that you're not drifting into some uncontrolled configuration state? And the third one is a fallback, is business continuity. Can you bring back and restore service when it goes down at inopportune times? I think what we're seeing is that when you look at high, medium, and low performers, you don't get the breakthrough in performance until you tackle change. I found two security executives who went into organizations and saw that there was no change control process, and they made the determination that their success hinges on having control over changes, and so they created the change management process, which is something I had never seen before. So I think it confirms deeply held intuitions for the practitioners decades ago, and we can even see how it is influencing security executives now. So, to answer your question, I think it's one thing to keep bad people away from business infrastructure, but in order to really make sure that you have a baseline, that you do not drift to a baseline, that security has to be a part of the change approval process, and they have to know when someone is circumventing the controls, because if you don't have control over change, then you really do not have control at all. Stephanie Losi: This is only coming out recently, and it seems to be a really strong finding in terms of the results of the study. We have known about access controls for years. I mean, there has been almost this obsessive focus on passwords and smart cards, file permissions, making sure only authorized users can access the resources they are supposed to access. Now, why do you think there is such a focus on access controls versus change management, especially as change management proved to be the determining factor in this study, and how would you propose shifting that in the larger security culture? Gene Kim: Oh, boy, another great question. I think the reason that security gravitates towards access controls is typically they are in complete control over it, kind of the issuance and revoking of entitlements and access, provisioning when business users are hired or fired. The link to change management is not often as strong in the job descriptions. And so I think we see two things happening. One is that in the high-performing organizations there is always some champion for the change management process, and when that exists, they own the prosecution of unauthorized change. So the instant an unauthorized change is made, essentially if operations doesn't prosecute that to completion, then it becomes security's responsibility. I think what we're seeing now is that when organizations don't have that champion for change management process, security executives are actually stepping up and saying, "Hey, in order to be secure, in order to have timely detection of variance before it causes a loss event, we need some sort of change management process." So they're actually willing these processes into being and, going back to the benchmarking findings, providing not only huge security benefits, but also huge operational benefits as well more projects, more changes, better change success rates, better first-fix failure rates, higher server/sys admin ratios, I mean, I think, evidence that security is helping improve daily operations. Part 3: Overcoming Hurdles Stephanie Losi: All right. Let s say an organization is implementing a change management process. What are some of the likely hurdles they might encounter? Do you ever find that there is

5 resistance among employees to this idea, or do they tend to just go along with it? And if there are hurdles, how can an organization overcome them? Gene Kim: Yeah. I think the biggest hurdle is the perception that change management is bureaucratic, slows things down, and sucks the will to live out of everybody it touches. When we look at the benchmarking findings, we find that this is absolutely not the case. They are getting more projects done. They are getting more changes done with a higher change rate, and they are getting less unplanned work due to failed changes. So I think there are three common misperceptions that are quickly formed by the organization. One is, "We can't enforce a change management process because we need our people to be creative. They are like precious birds. You can't put them in a cage." And I think the mis-thinking there is that building cars is very creative, but you can't have people moving equipment around on the production line. Second one is, "Our people are too highly paid for us to micromanage." I think what we find is that when you deal with something as mission critical as IT, the worst thing that can happen is for you not to have control, and you look at the difference between high and low performers. But I think the third one is maybe the most interesting to me, which is that it's always easier to draw pretty process diagrams on whiteboard or implement a technology. At a certain point management has to really earn their pay and figure out, "What do you do when Joey keeps making unauthorized changes?" At a certain point, management must make the call that, "Hey, the risk is so high around this, we have to put Joey in a role where he cannot make changes anymore." It doesn't mean firing him, it just means putting him in a role that's more suited to his temperament. Stephanie Losi: So if an organization has implemented change management but is not seeing any improvement, do you think some of these things might be at the root of that, or might it be other issues? What might be wrong, and where would you tell the organization to look based on your experience with change management rollouts? Gene Kim: Great question. So I think the benchmarking findings can help us there. I would look for the top two controls. Are they present? Do you have tone at the top as defined by defined consequences for intentional unauthorized change? The second thing I would look for is, are you enforcing a change management process to do controls, or is it just a meaningless binder on the bookshelf? The second thing is I would look for metrics where, if you are doing change management right, you should be able to see immediate improvements around. One is number of unplanned outages. Every time you have an unplanned outage, that is a failure in the change control process. So if you are doing the right things, you're not going to have these 2:00 a.m. all-hands-on-deck situations. Stephanie Losi: Everybody would like not to have those. Gene Kim: Absolutely. The second thing is look for reduction in mean time to repair. What you want to see is 80% of all issues are caused by change so you want to see people ruling out change first in the repair cycle, not last. And then one of my favorite metrics is change success rate. What percentage of changes actually work the first time and happen on schedule? And we find that high performers have change success rates of over 90%. Low-performing organizations sometimes as low as 50, 60%. Stephanie Losi: Right. And that is because of their change management process.

6 Gene Kim: Absolutely. Right. In fact, it is very difficult to bring your change success rate up to over 50, 60% without having some control over how you're making changes. And the enterprising, ambitious person might also even look at first-fix rate. What percentage of your fixes worked the first time, so when you have an incident or an outage or security incident, how many of your restoration procedures actually worked the first time? Best-in-class is again 90%, worst-in-class is 50% or below. Stephanie Losi: All right. Thank you very much, Gene. This has been great. Do you have any resources that you would point leaders to if they are considering implementing change management in their organization? Where should they look? Where should they go just to kind of get a background on this before they get started? Gene Kim: Absolutely. You can find the Visible Ops Handbook at the ITPI website. That is itpi.org. In fact, you will see Julia Allen is the person who wrote the foreword to that. And the other work that Julia Allen and I worked on is the Change Management Audit Guide through the Institute of Internal Auditors. And you can find that on the iia.org website. Stephanie Losi: Thank you very much. It s been a pleasure having you. Gene Kim: Thank you.

IT Service Management Metrics Metrics that Matter

IT Service Management Metrics Metrics that Matter Gene Kim, CTO, Tripwire, Inc. IT Service Management Metrics Metrics that Matter Four Key Benchmarks for Improving IT Performance white paper Configuration Control for Virtual and Physical Infrastructures

More information

IT Service Management Metrics that Matter. Reason to Improve: Unintended Consequences of Low Performance

IT Service Management Metrics that Matter. Reason to Improve: Unintended Consequences of Low Performance WHITE paper Four Key Benchmarks for Improving IT Performance page 2 page 3 page 4 page 5 page 6 page 6 Mean Time to Repair First Fix Rate Change Success Rate Server to System Administration Ratio Reason

More information

Computer Forensics for Business Leaders: Building Robust Policies and Processes Transcript

Computer Forensics for Business Leaders: Building Robust Policies and Processes Transcript Computer Forensics for Business Leaders: Building Robust Policies and Processes Transcript Part 1: Why Policy Is Key Stephanie Losi: Welcome to CERT's podcast series: Security for Business Leaders. The

More information

Show notes for today's conversation are available at the podcast website.

Show notes for today's conversation are available at the podcast website. What Business Leaders Can Expect from Security Degree Programs Transcript Part 1: Nuts and Bolts versus the Big Picture Stephanie Losi: Welcome to CERT's podcast series, Security for Business Leaders.

More information

Creating Effective Security Controls: A Ten Year Study of High Performing IT Security

Creating Effective Security Controls: A Ten Year Study of High Performing IT Security Configuration Assessment & & Change Auditing Solutions COMPLIANCE SECURITY CONTROL Creating Effective Security Controls: A Ten Year Study of High Performing IT Security Gene Kim, CISA CTO and Co-Founder

More information

BBBT Podcast Transcript

BBBT Podcast Transcript BBBT Podcast Transcript About the BBBT Vendor: The Boulder Brain Trust, or BBBT, was founded in 2006 by Claudia Imhoff. Its mission is to leverage business intelligence for industry vendors, for its members,

More information

Shownotes for today's conversation are available at the podcast website.

Shownotes for today's conversation are available at the podcast website. The Smart Grid: Managing Electrical Power Distribution and Use Transcript Part 1: The Vision for the Smart Grid Julia Allen: Welcome to CERT's Podcast Series: Security for Business Leaders. The CERT program

More information

How the University of Pittsburgh Is Using the NIST Cybersecurity Framework Transcript

How the University of Pittsburgh Is Using the NIST Cybersecurity Framework Transcript How the University of Pittsburgh Is Using the NIST Cybersecurity Framework Transcript Part 1: Applicability of the NIST CSF Lisa Young: Welcome to the CERT Podcast Series: Security for Business Leaders.

More information

So with no further ado, welcome back to the podcast series, Robert. Glad to have you today.

So with no further ado, welcome back to the podcast series, Robert. Glad to have you today. Raising the Bar: Mainstreaming CERT C Secure Coding Rules Transcript Part 1: How the Specification Came to be and Its Structure Julia Allen: Welcome to CERT's Podcast Series: Security for Business Leaders.

More information

Why Use Maturity Models to Improve Cybersecurity: Key Concepts, Principles, and Definitions Transcript

Why Use Maturity Models to Improve Cybersecurity: Key Concepts, Principles, and Definitions Transcript Why Use Maturity Models to Improve Cybersecurity: Key Concepts, Principles, and Definitions Transcript Part 1: What Are Maturity Models and Why Are They Useful? Julia Allen: Welcome to CERT's Podcast Series:

More information

BBC Learning English Talk about English Business Language To Go Part 1 - Interviews

BBC Learning English Talk about English Business Language To Go Part 1 - Interviews BBC Learning English Business Language To Go Part 1 - Interviews This programme was first broadcast in 2001. This is not a word for word transcript of the programme This series is all about chunks of language

More information

Introduction to Public Safety Project Management. Table of Contents. Introduction to Public Safety Project Management

Introduction to Public Safety Project Management. Table of Contents. Introduction to Public Safety Project Management Introduction to Public Safety Project Management Introduction to Public Safety Project Management Table of Contents Introduction to Public Safety Project Management... 2 What is Project Management... 3

More information

Average producers can easily increase their production in a larger office with more market share.

Average producers can easily increase their production in a larger office with more market share. The 10 Keys to Successfully Recruiting Experienced Agents by Judy LaDeur Understand whom you are hiring. Don t make the mistake of only wanting the best agents or those from offices above you in market

More information

Sales Training Programme. Module 7. Objection handling workbook

Sales Training Programme. Module 7. Objection handling workbook Sales Training Programme. Module 7. Objection handling workbook Workbook 7. Objection handling Introduction This workbook is designed to be used along with the podcast on objection handling. It is a self

More information

Principles of Modeling: Real World - Model World

Principles of Modeling: Real World - Model World MODELING BASICS Principles of Modeling: Real World - Model World Tony Starfield recorded: 2005 Welcome Welcome to Principles of Modeling We all build models on a daily basis. Sometimes we build them deliberately,

More information

A Conversation with Chris Denninger RIT Director of Public Safety Facilitated by Luke Auburn

A Conversation with Chris Denninger RIT Director of Public Safety Facilitated by Luke Auburn A Conversation with Chris Denninger RIT Director of Public Safety Facilitated by Luke Auburn [ Music ] Luke Auburn: You're listening to the RIT professional development podcast series. I'm your host Luke

More information

Health Care Vocabulary Lesson

Health Care Vocabulary Lesson Hello. This is AJ Hoge again. Welcome to the vocabulary lesson for Health Care. Let s start. * * * * * At the beginning of the conversation Joe and Kristin talk about a friend, Joe s friend, whose name

More information

English as a Second Language Podcast www.eslpod.com. ESL Podcast 292 Business Insurance

English as a Second Language Podcast www.eslpod.com. ESL Podcast 292 Business Insurance GLOSSARY to lose control of (something) to no longer be in control of something; to not be able to influence how something moves or happens * When I was driving home last night, I thought I was going to

More information

A: We really embarrassed ourselves last night at that business function.

A: We really embarrassed ourselves last night at that business function. Dialog: VIP LESSON 049 - Future of Business A: We really embarrassed ourselves last night at that business function. B: What are you talking about? A: We didn't even have business cards to hand out. We

More information

Could a Managed Services Agreement Save Your Company Tens of Thousands of Dollars Each Year?

Could a Managed Services Agreement Save Your Company Tens of Thousands of Dollars Each Year? MANAGED IT SERVICES Could a Managed Services Agreement Save Your Company Tens of Thousands of Dollars Each Year? A lot of business owners, executives, and managers have a love-hate relationship with managed

More information

Proving Control of the Infrastructure

Proving Control of the Infrastructure WHITE paper The need for independent detective controls within Change/Configuration Management page 2 page 3 page 4 page 6 page 7 Getting Control The Control Triad: Preventive, Detective and Corrective

More information

BBC LEARNING ENGLISH 6 Minute English Asking the right questions

BBC LEARNING ENGLISH 6 Minute English Asking the right questions BBC LEARNING ENGLISH 6 Minute English Asking the right questions NB: This is not a word-for-word transcript Hello and welcome to 6 Minute English. I'm and I'm. Now, I'm a big fan of chat shows, as you

More information

Will Dormann: Sure. Fuzz testing is a way of testing an application in a way that you want to actually break the program.

Will Dormann: Sure. Fuzz testing is a way of testing an application in a way that you want to actually break the program. The Power of Fuzz Testing to Reduce Security Vulnerabilities Transcript Part 1: Why Fuzz Testing? Julia Allen: Welcome to CERT's podcast series: Security for Business Leaders. The CERT program is part

More information

Developing a Growth Mindset An Interview with Dr. Carol Dweck

Developing a Growth Mindset An Interview with Dr. Carol Dweck Developing a Growth Mindset An Interview with Dr. Carol Dweck Stanford psychology professor Dr. Carol Dweck's ground-breaking research has major implications for how we raise our children-specifically

More information

Module 6.3 Client Catcher The Sequence (Already Buying Leads)

Module 6.3 Client Catcher The Sequence (Already Buying Leads) Module 6.3 Client Catcher The Sequence (Already Buying Leads) Welcome to Module 6.3 of the Client Catcher entitled The Sequence. I recently pulled over 300 of the local lead generation explosion members

More information

STEP 5: Giving Feedback

STEP 5: Giving Feedback STEP 5: Giving Feedback Introduction You are now aware of the responsibilities of workplace mentoring, the six step approach to teaching skills, the importance of identifying the point of the lesson, and

More information

Ep #19: Thought Management

Ep #19: Thought Management Full Episode Transcript With Your Host Brooke Castillo Welcome to The Life Coach School podcast, where it s all about real clients, real problems and real coaching. And now your host, Master Coach Instructor,

More information

Next Generation Tech-Talk. Cloud Based Business Collaboration with Cisco Spark

Next Generation Tech-Talk. Cloud Based Business Collaboration with Cisco Spark Next Generation Tech-Talk Cloud Based Business Collaboration with Cisco Spark 2 [music] 00:06 Phil Calzadilla: Hello, hello! Welcome. This is Phil Calzadilla founder and CEO of NextNet Partners, and I'd

More information

The 5 P s in Problem Solving *prob lem: a source of perplexity, distress, or vexation. *solve: to find a solution, explanation, or answer for

The 5 P s in Problem Solving *prob lem: a source of perplexity, distress, or vexation. *solve: to find a solution, explanation, or answer for The 5 P s in Problem Solving 1 How do other people solve problems? The 5 P s in Problem Solving *prob lem: a source of perplexity, distress, or vexation *solve: to find a solution, explanation, or answer

More information

English as a Second Language Podcast www.eslpod.com. ESL Podcast 164 Seeing a Specialist

English as a Second Language Podcast www.eslpod.com. ESL Podcast 164 Seeing a Specialist GLOSSARY nagging pain a pain that continues to hurt and that won t go away * I can t sleep at night because of the nagging pain in my back. routine tests regular tests, not special ones * The doctor ordered

More information

Interview with David Bouthiette [at AMHI 3 times] September 4, 2003. Interviewer: Karen Evans

Interview with David Bouthiette [at AMHI 3 times] September 4, 2003. Interviewer: Karen Evans Interview with David Bouthiette [at AMHI 3 times] September 4, 2003 Interviewer: Karen Evans KE: What we are going to talk about first are your experiences while you were at AMHI, and then we will go on

More information

Electronic Health Records: Challenges for Patient Privacy & Security Transcript

Electronic Health Records: Challenges for Patient Privacy & Security Transcript Electronic Health Records: Challenges for Patient Privacy & Security Transcript Part 1: Technical, Social, and Political Hurdles Julia Allen: Welcome to CERT's Podcast Series: Security for Business Leaders.

More information

Supply Chain Risk Management: Managing Third Party and External Dependency Risk Transcript

Supply Chain Risk Management: Managing Third Party and External Dependency Risk Transcript Supply Chain Risk Management: Managing Third Party and External Dependency Risk Transcript Part 1: Why SCRM Is Increasingly Critical Julia Allen: Welcome to CERT's Podcast Series: Security for Business

More information

Business @ the Speed of Thought

Business @ the Speed of Thought Bill Gates About the author Bill Gates wrote his first software program when he was thirteen years old. Two points about the experience seem clear. First, the ability to control something huge at a time

More information

WHAT IS NLP: A MODEL OF COMMUNICATION AND PERSONALITY

WHAT IS NLP: A MODEL OF COMMUNICATION AND PERSONALITY WHAT IS NLP: A MODEL OF COMMUNICATION AND PERSONALITY By Tad James, M.S., Ph.D. Neuro Linguistic Programming (NLP) began as a model of how we communicate to ourselves and others which was developed by

More information

So, why should you have a website for your church? Isn't it just another thing to add to the to-do list? Or will it really be useful?

So, why should you have a website for your church? Isn't it just another thing to add to the to-do list? Or will it really be useful? Why Have A Website? So, why should you have a website for your church? Isn't it just another thing to add to the to-do list? Or will it really be useful? Obviously, 'everyone else does' it not a good enough

More information

Interview: Professor Adrian Payne. Handbook of CRM: Achieving Excellence in Customer Management.

Interview: Professor Adrian Payne. Handbook of CRM: Achieving Excellence in Customer Management. Interview: Handbook of CRM: Achieving Excellence in Customer Management. Hello, this is Steve Macaulay from Cranfield School of Management. I am here today to discuss with his book Handbook of CRM: Achieving

More information

Earn Money Sharing YouTube Videos

Earn Money Sharing YouTube Videos Earn Money Sharing YouTube Videos Get Started FREE! Make money every time you share a video, also make money every time the videos you have shared get watched! Unleash The Viral Power of Social Media To

More information

Using collaboration to enable the innovators in your organization. Welcome to the IBM CIO Podcast Series. I'm your host, Jeff Gluck,

Using collaboration to enable the innovators in your organization. Welcome to the IBM CIO Podcast Series. I'm your host, Jeff Gluck, IBM Global Technology Services www.ibm.com/services IBM Podcast Using collaboration to enable the innovators in your organization Welcome to the IBM CIO Podcast Series. I'm your host, Jeff Gluck, and my

More information

The Commission Cutting Report

The Commission Cutting Report The Commission Cutting Report Why they re being cut and what you can do about it! By Mike Ferry Page 1 of 17 THE COMMISSION CUTTING REPORT Why am I writing a report of this type? Why is a report of this

More information

Social Skills for Kids with ADD (ADHD)

Social Skills for Kids with ADD (ADHD) Social Skills for Kids with ADD (ADHD) "Nobody wants to play with me." "I never get invited to birthday parties." "The kids were teasing me today at school." "I don't fit in." Sound familiar? We've all

More information

TeachingEnglish Lesson plans. Conversation Lesson News. Topic: News

TeachingEnglish Lesson plans. Conversation Lesson News. Topic: News Conversation Lesson News Topic: News Aims: - To develop fluency through a range of speaking activities - To introduce related vocabulary Level: Intermediate (can be adapted in either direction) Introduction

More information

Permission-Based Marketing for Lawyers

Permission-Based Marketing for Lawyers Permission-Based Marketing for Lawyers Jim Hart is a divorce attorney in Cary, North Carolina. Previously, his law practice was based in Florida. He owns several websites. Jameshartlaw.com redirects to

More information

Coaching Models. GROW Model

Coaching Models. GROW Model Coaching Models There are various effective coaching models which some coaches choose to use to structure their coaching sessions. The models may be helpful to guide your sessions through a logical sequence

More information

Picture yourself in a meeting. Suppose there are a dozen people

Picture yourself in a meeting. Suppose there are a dozen people 1 WHAT IS ACCOUNTABILITY, REALLY? Hypocrisy exists in the space between language and action. Picture yourself in a meeting. Suppose there are a dozen people seated around a table and someone says, I m

More information

Quick Tricks for Multiplication

Quick Tricks for Multiplication Quick Tricks for Multiplication Why multiply? A computer can multiply thousands of numbers in less than a second. A human is lucky to multiply two numbers in less than a minute. So we tend to have computers

More information

Are You Prepared For Tricky Behavioral Interview Questions Like These??... (See the Answers below)

Are You Prepared For Tricky Behavioral Interview Questions Like These??... (See the Answers below) 1 Are You Prepared For Tricky Behavioral Interview Questions Like These??... (See the Answers below) Why did you leave your last job? Have you ever been fired or forced to resign? Why have you had so many

More information

Marty's Big Mistake A short story about character by Wes Fessler Marty mouse was walking home from school one sunny day. A rock was on the sidewalk, which he kicked along the way. The rock would bounce

More information

Free Report. My Top 10 Tips to Betting Like a Pro With Zero Risk

Free Report. My Top 10 Tips to Betting Like a Pro With Zero Risk Free Report My Top 10 Tips to Betting Like a Pro With Zero Risk Legal Disclaimer: EVERY EFFORT HAS BEEN MADE TO ACCURATELY REPRESENT THIS PRODUCT AND IT'S POTENTIAL. EVEN THOUGH THIS INDUSTRY IS ONE OF

More information

Seven Steps to Starting Your Own NP Practice

Seven Steps to Starting Your Own NP Practice Transcript Details This is a transcript of an educational program accessible on the ReachMD network. Details about the program and additional media formats for the program are accessible by visiting: https://reachmd.com/programs/partners-in-practice/seven-steps-to-starting-your-own-np-practice/6345/

More information

How to Manage your Extracurricular Activities

How to Manage your Extracurricular Activities How to Manage your Extracurricular Activities First, Let's Define (and separate) Extracurricular and Volunteering. "Extracurricular" generally means any activities not involved with academics; however

More information

BBC LEARNING ENGLISH 6 Minute English The meaning of clothes

BBC LEARNING ENGLISH 6 Minute English The meaning of clothes BBC LEARNING ENGLISH 6 Minute English The meaning of clothes NB: This is not a word-for-word transcript Hello and welcome to 6 Minute English. I'm and I'm. Hello. Hi there,. I have to say, I like that

More information

THEME: God desires for us to demonstrate His love!

THEME: God desires for us to demonstrate His love! Devotion NT320 CHILDREN S DEVOTIONS FOR THE WEEK OF: LESSON TITLE: The Gift of Love THEME: God desires for us to demonstrate His love! SCRIPTURE: 1 Corinthians 13:1-13 Dear Parents Welcome to Bible Time

More information

BBC LEARNING ENGLISH 6 Minute English Have you got too much stuff?

BBC LEARNING ENGLISH 6 Minute English Have you got too much stuff? BBC LEARNING ENGLISH 6 Minute English Have you got too much stuff? NB: This is not a word-for-word transcript Hello and welcome to 6 Minute English. I'm And I'm. Now,, what did you get up to at the weekend?

More information

100 Ways To Improve Your Sales Success. Some Great Tips To Boost Your Sales

100 Ways To Improve Your Sales Success. Some Great Tips To Boost Your Sales 100 Ways To Improve Your Sales Success Some Great Tips To Boost Your Sales 100 Ways To Improve Your Sales Success By Sean Mcpheat, Managing Director Of The Sales Training Consultancy What makes a successful

More information

May 25th, 2016--"Car Buying: How to Avoid the Extra Stress"--Mary Dittfurth

May 25th, 2016--Car Buying: How to Avoid the Extra Stress--Mary Dittfurth May 25th, 2016--"Car Buying: How to Avoid the Extra Stress"--Mary Dittfurth The car-buying process can get pretty stressful, especially if you re not prepared for it. Car buying is supposed to be exciting,

More information

BizBuck$ Plan. Roxanne Zimmerman

BizBuck$ Plan. Roxanne Zimmerman BizBuck$ Plan Roxanne Zimmerman Good Morning, PartyLite! As always, I'm so excited to be here with all of you and also so excited about our new and improved Join the Party sponsoring brochure and video.

More information

Five Mistakes People Make Reading Body Language And Five Nonverbal Signals That Send Positive Messages

Five Mistakes People Make Reading Body Language And Five Nonverbal Signals That Send Positive Messages Five Mistakes People Make Reading Body Language And Five Nonverbal Signals That Send Positive Messages This is one of a series of occasional papers by The Dilenschneider Group to bring clients and friends

More information

JW Marriott Hotel Kuala Lumpur

JW Marriott Hotel Kuala Lumpur JW Marriott Hotel Kuala Lumpur An exclusive report to be distributed with THE INDEPENDENT Transcript of the interview with: Mr Mahmoud Skaf General Manager WORLD REPORT: In your opinion, what is it about

More information

Incident Management Get Your Basics Right

Incident Management Get Your Basics Right Incident Management Get Your Basics Right Introduction Neil Thomas Industry experience in IT & IT support ITIL Vendor Product Management ITIL Consulting Specialised in Service Catalog & CMDB Introduction

More information

OUTSOURCE IT OR KEEP IT IN-HOUSE?

OUTSOURCE IT OR KEEP IT IN-HOUSE? OUTSOURCE IT OR KEEP IT IN-HOUSE? RON SELLERS GREY MATTER RESEARCH & CONSULTING Originally published in Quirk s Marketing Research Review, May 1998 To outsource, or not to outsource: that is the question.

More information

These Retail Specific Programs Are Guaranteed To Be A Hit With Your Group!

These Retail Specific Programs Are Guaranteed To Be A Hit With Your Group! These Retail Specific Programs Are Guaranteed To Be A Hit With Your Group! NEW! Marketing Program: Power Promotions - Drive More Traffic, Build Customer Loyalty and Make More Money With Promotions and

More information

A Guide to Cover Letter Writing

A Guide to Cover Letter Writing A Guide to Cover Letter Writing Contents What is a Cover Letter?... 2 Before you get started - Do your Research... 3 Formatting the letter... 4 Cover letter content... 5 Section 1 - Opening... 5 Section

More information

Audit Rotation: Impact on Accountants, Firms & India Inc?

Audit Rotation: Impact on Accountants, Firms & India Inc? Page 1 of 5 Friday: 10.30 pm, Saturday: 11.30 am Sunday: 9:30am & 11.00pm Home About Us Feedback Audit Rotation: Impact on Accountants, Firms & India Inc? Tweet Published on Sat, Dec 03,2011 09:46, Updated

More information

Transcript: Optimizing Times on Calls

Transcript: Optimizing Times on Calls Transcript: Optimizing Times on Calls Pedram Shojai: Let's talk about your phone calls. Phone calls are an amazing way waste of time if you don't know how to use them. I used to have my days booked with

More information

Jenesis Software - Podcast Episode 2

Jenesis Software - Podcast Episode 2 Jenesis Software - Podcast Episode 2 All right, welcome to episode two with Chuck, Eddie, And Benny. And we're doing some technical talk today about network speed on episode two. Let's talk about, guys,

More information

Software Outsourcing - Software Development. info@westtownwebservices.com

Software Outsourcing - Software Development. info@westtownwebservices.com Hi I m Tony Radford from West Town Web Services. We area UK based great value, high quality software development and outsourcing solutions business. If you need software built or looked after please get

More information

PINK ELEPHANT THOUGHT LEADERSHIP WHITE PAPER DEVELOPING AN IT SERVICE MANAGEMENT TRAINING STRATEGY & PLAN

PINK ELEPHANT THOUGHT LEADERSHIP WHITE PAPER DEVELOPING AN IT SERVICE MANAGEMENT TRAINING STRATEGY & PLAN PINK ELEPHANT THOUGHT LEADERSHIP WHITE PAPER DEVELOPING AN IT SERVICE MANAGEMENT TRAINING STRATEGY & PLAN Executive Summary Developing and implementing an overall IT Service Management (ITSM) training

More information

15 Most Typically Used Interview Questions and Answers

15 Most Typically Used Interview Questions and Answers 15 Most Typically Used Interview Questions and Answers According to the reports made in thousands of job interviews, done at ninety seven big companies in the United States, we selected the 15 most commonly

More information

Digging Deeper into Safety and Injury Prevention Data

Digging Deeper into Safety and Injury Prevention Data Digging Deeper into Safety and Injury Prevention Data Amanda Schwartz: Have you ever wondered how you could make your center safer using information you already collect? I'm Amanda Schwartz from the Head

More information

Fewer. Bigger. Stronger.

Fewer. Bigger. Stronger. Fewer. Bigger. Stronger. The Secret to Setting Great Goals Fewer. Bigger. Stronger. Fewer. Bigger. Stronger. The Secret to Setting Great Goals by Marc Effron, President, The Talent Strategy Group While

More information

Presentations Phrases Prepositions Pairwork Student A Choose one of the sections below and read out one of the example sentences with a gap or noise

Presentations Phrases Prepositions Pairwork Student A Choose one of the sections below and read out one of the example sentences with a gap or noise Presentations Phrases Prepositions Pairwork Student A Choose one of the sections below and read out one of the example sentences with a gap or noise instead of the preposition. Your partner can guess the

More information

Configuration Management One Bite At A Time

Configuration Management One Bite At A Time Configuration Management One Bite At A Time By Kai Holthaus, ITIL v3 Expert and Director for Third Sky, Inc. Implementing Configuration Management can be a daunting challenge. While the potential payback

More information

>> My name is Danielle Anguiano and I am a tutor of the Writing Center which is just outside these doors within the Student Learning Center.

>> My name is Danielle Anguiano and I am a tutor of the Writing Center which is just outside these doors within the Student Learning Center. >> My name is Danielle Anguiano and I am a tutor of the Writing Center which is just outside these doors within the Student Learning Center. Have any of you been to the Writing Center before? A couple

More information

PUSD High Frequency Word List

PUSD High Frequency Word List PUSD High Frequency Word List For Reading and Spelling Grades K-5 High Frequency or instant words are important because: 1. You can t read a sentence or a paragraph without knowing at least the most common.

More information

Thinking about College? A Student Preparation Toolkit

Thinking about College? A Student Preparation Toolkit Thinking about College? A Student Preparation Toolkit Think Differently About College Seeking Success If you are like the millions of other people who are thinking about entering college you are probably

More information

Why Your Business Needs a Website: Ten Reasons. Contact Us: 727.542.3592 Info@intensiveonlinemarketers.com

Why Your Business Needs a Website: Ten Reasons. Contact Us: 727.542.3592 Info@intensiveonlinemarketers.com Why Your Business Needs a Website: Ten Reasons Contact Us: 727.542.3592 Info@intensiveonlinemarketers.com Reason 1: Does Your Competition Have a Website? As the owner of a small business, you understand

More information

12 Proven Principles for Process Improvement & Organizational Success

12 Proven Principles for Process Improvement & Organizational Success 12 Proven Principles for Process Improvement & Organizational Success EU SEPG Conference June 2008 Dr. Richard Bechtold : Slide #: 2 12 Proven Principles for Process Improvement and Organizational Success

More information

Starting Your Fee Based Financial Planning Practice From Scratch (Part 2) FEE008

Starting Your Fee Based Financial Planning Practice From Scratch (Part 2) FEE008 Starting Your Fee Based Financial Planning Practice From Scratch (Part 2) FEE008 Episode Transcript Host: Scott Plaskett, CFP Okay. So let s get onto the feature segment. And this is a continuation from

More information

As you ask them and if not, you have things to question, we can answer, we can give advice to you by email within 24 hours.

As you ask them and if not, you have things to question, we can answer, we can give advice to you by email within 24 hours. Thanks for your patience and welcome to the CDI MobyMax Interactive Webinar this afternoon. We appreciate you joining us. I now have with me most of you are. Certainly, we'll do our best to make today's

More information

Multiplication Rules! Tips to help your child learn their times tables

Multiplication Rules! Tips to help your child learn their times tables Multiplication Rules! Tips to help your child learn their times tables 1. Have fun! We want relaxed kids and plenty of giggles. 2. Go slowly and relax. 3. Do the preliminary review, all the preliminary

More information

The Essential Elements of Writing a Romance Novel

The Essential Elements of Writing a Romance Novel The Essential Elements of Writing a Romance Novel by Leigh Michaels Even if you re a seat-of-the-pants, explore-as-you-go sort of writer, there are a few things you need to know about your story before

More information

Quick Preview PROPERTY DAMAGE

Quick Preview PROPERTY DAMAGE Quick Preview PROPERTY DAMAGE You are you first priority, take care of you first Understand rental insurance, towing and storage costs Figure out what kind of insurance coverage you have Choose a reputable

More information

Change, Configuration, and Release: What s Really Driving Top Performance?

Change, Configuration, and Release: What s Really Driving Top Performance? Change, Configuration, and Release: What s Really Driving Top Performance? 7 groups of best practices predict top levels of performance at 341 IT organizations Advancing the Science of IT Management IT

More information

Transcription. Founder Interview - Panayotis Vryonis Talks About BigStash Cloud Storage. Media Duration: 28:45

Transcription. Founder Interview - Panayotis Vryonis Talks About BigStash Cloud Storage. Media Duration: 28:45 Transcription Founder Interview - Panayotis Vryonis Talks About BigStash Cloud Storage Media Duration: 28:45 Feel free to quote any passage from this interview for your articles. Please reference cloudwards.net

More information

Why Disruptive Innovations Matter in Laboratory Diagnostics

Why Disruptive Innovations Matter in Laboratory Diagnostics Article: S. Nam.. Clin Chem 2015;61:935-937. http://www.clinchem.org/content/61/7/935.extract Guest: Spencer Nam is a Research Fellow specializing in healthcare at the Clayton Christensen Institute for

More information

worksheet: personal history questions

worksheet: personal history questions worksheet: personal history questions Childhood What was your childhood home like? Your neighborhood? Was your parents relationship a strong one? Which of them were you closer to? When you were growing

More information

Tray Thompson: Welcome everyone. We now have our. webinar, our second webinar, which is Banking 101. I

Tray Thompson: Welcome everyone. We now have our. webinar, our second webinar, which is Banking 101. I 0 Banking 0 Tray Thompson: Welcome everyone. We now have our webinar, our second webinar, which is Banking 0. I have myself, Tray Thompson, here. I work for the Financial Aid Office and I also have Mario.

More information

Student Essays on NASA Project

Student Essays on NASA Project Student Essays on NASA Project The trip to Washington D.C. for the Quarterbacks of Life program was enlightening for various reasons; it goes without saying that being able to visit the nation's capital,

More information

Behavioral Interview Questions

Behavioral Interview Questions Behavioral Interview Questions Carnegie Mellon has identified five core competencies that are required of all employees for success at the university. These are: Customer Service Teamwork Initiative Leadership

More information

Jenesis Software - Podcast Episode 3

Jenesis Software - Podcast Episode 3 Jenesis Software - Podcast Episode 3 Welcome to Episode 3. This is Benny speaking, and I'm with- Eddie. Chuck. Today we'll be addressing system requirements. We will also be talking about some monitor

More information

BBC LEARNING ENGLISH 6 Minute English The Proms

BBC LEARNING ENGLISH 6 Minute English The Proms BBC LEARNING ENGLISH 6 Minute English The Proms This is not a word-for-word transcript Hello and welcome to 6 Minute English. I'm and I'm. Hello. Now,, are you doing anything interesting tonight? Well,

More information

360 feedback. Manager. Development Report. Sample Example. name: email: date: sample@example.com

360 feedback. Manager. Development Report. Sample Example. name: email: date: sample@example.com 60 feedback Manager Development Report name: email: date: Sample Example sample@example.com 9 January 200 Introduction 60 feedback enables you to get a clear view of how others perceive the way you work.

More information

BBC Learning English Talk about English Business Language To Go Part 10 - Dealing with difficult clients

BBC Learning English Talk about English Business Language To Go Part 10 - Dealing with difficult clients BBC Learning English Business Language To Go Part 10 - Dealing with difficult clients This programme was first broadcast in 2001. This is not an accurate word-for-word transcript of the programme. We ll

More information

Classroom Lesson :City on the Rise

Classroom Lesson :City on the Rise Classroom Lesson :City on the Rise Curriculum Connections This lesson fits in perfectly with units that address curriculum standards in language arts, social studies, civics, economics, thinking and reasoning,

More information

How did software code come to be such a force, not only in business but also in culture? Powered by

How did software code come to be such a force, not only in business but also in culture? Powered by How did software code come to be such a force, not only in business but also in culture? Computer geeks everywhere can look to Bill Gates as a role model. The phenomenal success of Microsoft, the company

More information

56 Key Profit Building Lessons I Learned from Jay Abraham s MasterMind Marketing Training.

56 Key Profit Building Lessons I Learned from Jay Abraham s MasterMind Marketing Training. 56 Key Profit Building Lessons I Learned from Jay Abraham s MasterMind Marketing Training. Jay Abraham is a man you should all know. If you do not - go to the library and start learning - just do it! He

More information

Math: Study Skills, Note Taking Skills, And Test Taking Strategies

Math: Study Skills, Note Taking Skills, And Test Taking Strategies Math: Study Skills, Note Taking Skills, And Test Taking Strategies Math Study Skill Active Study vs. Passive Study Be actively involved in managing the learning process, the mathematics and your study

More information

Secrets From OfflineBiz.com Copyright 2010 Andrew Cavanagh all rights reserved

Secrets From OfflineBiz.com Copyright 2010 Andrew Cavanagh all rights reserved Secrets From OfflineBiz.com Copyright 2010 Andrew Cavanagh all rights reserved The Lucrative Gold Mine In Brick And Mortar Businesses If you've studied internet marketing for 6 months or more then there's

More information

Parents Corner. Habit 1 Be ProActive * You re In Charge

Parents Corner. Habit 1 Be ProActive * You re In Charge Habit 1 Be ProActive * You re In Charge I can t count how many times my kids have whined, Dad, we re so bored! There s nothing to do, as if their boredom was somehow my fault I ll respond with something

More information